Sentdex.com
Facebook.com/sentdex
Twitter.com/sentdex
How to use python to encrypt sensitive information, and later decrypt it, using PyCrypto!
PyCrypto: https://www.dlitz.net/software/pycrypto/
The Code: http://sentdex.com/sentiment-analysisbig-data-and-python-tutorials/encryption-and-decryption-in-python-code-example-with-explanation/

Cryptography is a complex and confusing subject. In this talk you will learn about the core components of cryptography used in software development: securing data with encryption, ensuring data integrity with hashes and digital signatures, and protecting passwords with key derivation functions. While learning how to use these components, you will also learn the best practices that drive strong cryptography. This talk won’t make you a cryptography expert but it will give you the knowledge necessary to use cryptography properly. No prior knowledge of cryptography is required for this presentation.
EVENT:
Dutch PHP Conference in 2018
SPEAKER:
Adam Englander
PERMISSIONS:
Original video was published with the Creative Commons Attribution license (reuse allowed).
CREDITS:
Original video source: https://www.youtube.com/watch?v=KcjJ19geKmA

📖📕 GET THE NEW TINKERNUT BOOK: http://bit.ly/Tinkernutbook 📕📖
This video lays out the steps for creating a very simple encryption and decryption program using free tools. The programming language we will be using is VB Script. See if you can decrypt this text:
wkjlue#vnrro#huxwxi#uxr\
You can find all the code for this program as well as an alternative for Apple computers at the project page:
http://www.tinkernut.com/archives/4193

There are lots of different ways to encrypt a message, from early, simple ciphers to the famous Enigma machine. But it’s tough to make a code truly unbreakable.
Hosted by: Michael Aranda
----------
Dooblydoo thanks go to the following Patreon supporters -- we couldn't make SciShow without them! Shout out to Justin Ove, John Szymakowski, Fatima Iqbal, Justin Lentz, David Campos, and Chris Peters.
----------
Like SciShow? Want to help support us, and also get things to put on your walls, cover your torso and hold your liquids? Check out our awesome products over at DFTBA Records: http://dftba.com/scishow
Or help support us by becoming our patron on Patreon:
https://www.patreon.com/scishow
----------
Looking for SciShow elsewhere on the internet?
Facebook: http://www.facebook.com/scishow
Twitter: http://www.twitter.com/scishow
Tumblr: http://scishow.tumblr.com
Instagram: http://instagram.com/thescishow
Sources:
http://www.vectorsite.net/ttcode_04.html#m3
http://www.simonsingh.net/The_Black_Chamber/crackingprinciple.html
http://book.itep.ru/depository/crypto/Cryptography_history.pdf
http://www.cs.trincoll.edu/~crypto/historical/gronsfeld.html
http://www.sans.org/reading-room/whitepapers/vpns/history-encryption-730
http://ftp.stmarys-ca.edu/jsauerbe/m10s11/chapter5.pdf
http://www.turing.org.uk/scrapbook/ww2.html
http://enigma.louisedade.co.uk/howitworks.html
http://www.codesandciphers.org.uk/enigma/example1.htm
http://www.pbs.org/wgbh/nova/military/how-enigma-works.html
http://www.cs.miami.edu/~burt/learning/Csc609.051/notes/02.html

In this video we'll be creating our own blockchain in Python! We'll also be using SHA256 for our proof-of-work to mine our blockchain.
Go to https://howcode.org for more!
Source code: https://howco.de/simple-python-blockchain
Link to DigitalOcean: http://howco.de/d_ocean
Link to howCode Facebook: http://howco.de/fb
Link to howCode Twitter: http://howco.de/twitter
Link to /r/howCode: http://howco.de/reddit
Don't forget to subscribe for more!

My Book: https://www.amazon.com/Building-Bitcoin-Websites-Beginners-Development/dp/153494544X
A simple introduction tutorial to get started with the pybitcointools Python library.
https://github.com/vbuterin/pybitcointools

XOR ciphers take advantage of Ascii encoding and basic bit switching operations. They are extremely fast, but not particularly secure when used alone, without a key exchange algorithm. XOR ciphers make up much of the basis of how modern encryption works.
More Crypto 101:
ADFVGX - https://www.youtube.com/watch?v=Y5-ory-Z25g
Pigpen - https://www.youtube.com/watch?v=bUlIvx0fgV8
Homophonic Cipher - https://www.youtube.com/watch?v=sB_3fcO8G24
Vigenère Cipher - https://www.youtube.com/watch?v=QzizXgWGjcM
Cracking Substitution Ciphers - https://www.youtube.com/watch?v=p99Wo_rr7OA
Caesar shift and Atbash - https://www.youtube.com/watch?v=BbcYLI_3mNA
Support me on Patreon if you are into that - https://www.patreon.com/laingsoft

In this video I have explained the encryption term very briefly. I have explained about the historical background of encryption vs modern algorithms of the encryption techniques. Feel free to comment and dont forget to subscribe.

This is a program to transfer strings/text into a encrypted text/string using the caesar wheel (google it..), really simple.
Code: http://www.codeshare.io/MIwEz (if you know python well, you should be able to learn how this works)
Screen Recorder: BroadCaster
Video Editer: Movie Maker (windows 8)
The Text Editor I use in the video is called "sublime text2", it's sort of a IDE, but it's more on the side of being a text editor, as it can't get user input
Song: Kuusou Mesorogiwi - Mirai Nikki OP 1 [piano] https://www.youtube.com/watch?v=drlB2RT_XiA

The math behind cryptography is immensely fascinating, I could spend all day studying it! We're going to go over some fundamental cryptographic concepts like hashing, zero knowledge proofs, and my favorite 'ZK-Snarks'. This is quite an in-depth video, i had to pick and choose the topics i wanted to dive into more. There is so, so much i could talk about. Each of these topics could deserve their own course. Cryptography is going to be paramount to building future decentralized Artificial Intelligence systems that we can both control and protect from attackers.
Code for this video:
https://github.com/llSourcell/crypto_math/blob/master/Crypto%20Math.ipynb
Please Subscribe! And like. And comment. That's what keeps me going.
Want more education? Connect with me here:
Twitter: https://twitter.com/sirajraval
Facebook: https://www.facebook.com/sirajology
instagram: https://www.instagram.com/sirajraval
More learning resources:
https://www.tutorialspoint.com/cryptography/
https://gpgtools.tenderapp.com/kb/how-to/introduction-to-cryptography
https://www.khanacademy.org/computing/computer-science/cryptography
https://www.ibm.com/developerworks/tivoli/tutorials/s-crypto/s-crypto.html
https://openmined.org/
Join us in the Wizards Slack channel:
http://wizards.herokuapp.com/
And please support me on Patreon:
https://www.patreon.com/user?u=3191693
Signup for my newsletter for exciting updates in the field of AI:
https://goo.gl/FZzJ5w
Hit the Join button above to sign up to become a member of my channel for access to exclusive content!

This is part 11 of the Blockchain tutorial explaining how the generate a public private key using Elliptic Curve.
In this video series different topics will be explained which will help you to understand blockchain.
Bitcoin released as open source software in 2009 is a cryptocurrency invented by Satoshi Nakamoto (unidentified person or group of persons).
After the introduction of Bitcoin many Bitcoin alternatives were created. These alternate cryptocurrencies are called Altcoins (Litecoin, Dodgecoin etc).
Bitcoin's underlying technology is called Blockchain.
The Blockchain is a distributed decentralized incorruptible database (ledger) that records blocks of digital information. Each block contains a timestamp and a link to a previous block.
Soon people realises that there many other use cases where the Blockchain technology can be applied and not just as a cryptocurrency application.
New Blockchain platforms were created based on the Blockchain technology, one of which is called Ethereum.
Ethereum focuses on running programming code, called smart contracts, on any decentralized application.
Using the new Blockchain platforms, Blockchain technology can be used in supply chain management, healthcare, real estate, identity management, voting, internet of things, etcetera, just to name a few.
Today there is a growing interest in Blockchain not only in the financial sector but also in other sectors.
Explaining how Blockchain works is not easy and for many the Blockchain technology remains an elusive concept.
This video series tries to explain Blockchain to a large audience but from the bottom up.
Keywords often used in Blockchain conversation will be explained.
Each Blockchain video is short and to the point.
It is recommended to watch each video sequentially as I may refer to certain Blockchain topics explained earlier.
Check out all my other Blockchain tutorial videos
https://goo.gl/aMTFHU
Subscribe to my YouTube channel
https://goo.gl/61NFzK
The presentation used in this video tutorial can be found at:
http://www.mobilefish.com/developer/blockchain/blockchain_quickguide_tutorial.html
The presentation used in this video tutorial can be found at:
http://www.mobilefish.com/developer/blockchain/blockchain_quickguide_tutorial.html
The python script used in the video:
https://www.mobilefish.com/download/cryptocurrency/bitcoin_ec_key_generation.py.txt
Cryptocurrency address generator and validator:
https://www.mobilefish.com/services/cryptocurrency/cryptocurrency.html
Desmos graph:
https://www.desmos.com/calculator/kkj2efqk5x
James D'Angelo, Bitcoin 101 Elliptic Curve Cryptography Part 4:
https://youtu.be/iB3HcPgm_FI
#mobilefish #blockchain #bitcoin #cryptocurrency #ethereum

I was bored and browsing youtube videos earlier and I watched a brief video on cryptography and decided to write a program to implement one of the ideas I saw. Dashed this out in Python to encrypt/decrypt text. It uses a private key and is relatively secure. Just a bit of fun for any of the nerds out there

In this vid we'll fill out the bodies to three of the steps in AES. These three steps are AddRoundKey, SubBytes and ShiftRows. The remaining steps to AES are rather fiddly, MixColumns and ExpandKey, so we'll look at those separately.
I've also taken the opportunity to introduce Galois fields for the AddRoundKey section. AddRoundKey is really just a matter of performing XOR, but it helps to understand Galois fields before we come to the MixColumns step.
Link to the S_Box on Wikipedia:
https://en.wikipedia.org/wiki/Rijndael_S-box
Link to the Finite Field/Galois Field Wikipedia page:
https://en.wikipedia.org/wiki/Finite_field
Become a patron and support What's a Creel programming vids on Patreon:
www.patreon.com/whatsacreel
Play Intergalactic Memory for Free:
http://apps.microsoft.com/windows/en-us/app/intergalactic-memory-free/92c1094c-32f5-4730-86f3-c43c46affe52
Full version of Intergalactic Memory:
http://apps.microsoft.com/windows/app/intergalactic-memory/ae9457e6-dbc1-468b-93cb-39f80835f19a
FaceBook:
www.facebook.com/pages/WhatsaCreel/167732956665435

In this vid we'll complete the encryption side of our implementation of AES. I've decided not to go though decryption, which is much the same type of logic in reverse, and with the opposite look-up tables.
If you actually have to include AES in your programs, use assembly or AES intrinsics. Our implementation is not secure, and it's very slow. Modern CPU's have an instruction set called the AES Instruction Set, which makes this whole task a lot easier, and a lot faster.
The babies you can hear at point are my sweet little nieces. I live with my bro and his gf. They've just had twins. They sound like they're being attacked by an elephant, but they are just hungry. They quieten down when their ma feeds them.
I hope this vid series was helpful for folks studying the algorithm. There's very few examples of exactly how to code this thing. Anywho, I really wanted to make a good go of it. Well here it is! Now we can look at something completely different!
Well probably not that different...?
Music Channel:
https://www.youtube.com/channel/UC2nWRGqPL6O-Lm8mexWhISQ
Patreon:
www.patreon.com/whatsacreel
FaceBook:
www.facebook.com/pages/WhatsaCreel/167732956665435
Twitter:
https://twitter.com/WhatsACreel

This playlist/video has been uploaded for Marketing purposes and contains only selective videos.
For the entire video course and code, visit [http://bit.ly/2jeErfC].
The aim of this video is to explore AES and Private-key encryption. We will take a look at key and block size. We will also explore AES in python alongwith Confusion and Diffusion.
• AES and Private-key encryption
• Key and Block size
• Confusion and diffusion
For the latest Networking & Servers video tutorials, please visit
http://bit.ly/2lkC8Kb
Find us on Facebook -- http://www.facebook.com/Packtvideo
Follow us on Twitter - http://www.twitter.com/packtvideo

Welcome to part four in our series on Elliptic Curve Cryptography. I this episode we dive into the development of the public key. In just 44 lines of code, with no special functions or imports, we produce the elliptic curve public key for use in Bitcoin. Better still, we walk you through it line by line, constant by constant. Nothing makes the process clearer and easier to understand than seeing it in straight forward code. If you've been wondering about the secp256k1 (arguably the most important piece of code in Bitcoin), well then this is the video for you.
This is part 4 of our upcoming series on Elliptic Curves. Because of such strong requests, even though this is part 4, it is the first one we are releasing. In the next few weeks we will release the rest of the series. Enjoy.
Here's the link to our Python code (Python 2.7.6):
https://github.com/wobine/blackboard101/blob/master/EllipticCurvesPart4-PrivateKeyToPublicKey.py
Here's the private key and the link to the public address that we use. Do you know why it is famous?
Private Key : A0DC65FFCA799873CBEA0AC274015B9526505DAAAED385155425F7337704883E
Public Address on Blockchain.info
https://blockchain.info/address/1JryTePceSiWVpoNBU8SbwiT7J4ghzijzW
Here's the private key we use at the end:
42F615A574E9CEB29E1D5BD0FDE55553775A6AF0663D569D0A2E45902E4339DB
Public Address on Blockchain.info
https://blockchain.info/address/16iTdS1yJhQ6NNQRJqsW9BF5UfgWwUsbF
Welcome to WBN's Bitcoin 101 Blackboard Series -- a full beginner to expert course in bitcoin. Please like, subscribe, comment or even drop a little jangly in our bitcoin tip jar 1javsf8GNsudLaDue3dXkKzjtGM8NagQe. Thanks, WBN